A Chinese Continuous Keystroke Authentication Method Using Cognitive Factors

被引:0
作者
Lin, Tu-Liang [1 ]
Chen, Yu-Sheng [1 ]
机构
[1] Natl Chiayi Univ, Dept Management Infoimat Syst, Chiayi, Taiwan
来源
2019 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - TAIWAN (ICCE-TW) | 2019年
关键词
Authentication; Keystroke Dynamics; Cognitive Factors; one-class SVM; DYNAMICS;
D O I
10.1109/icce-tw46550.2019.8991902
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Everyone has different biometrics, so personal biometrics can be applied to authentication. Moreover, the biological characteristics are not easy to be copied, and the user does not need to memorize and does not need to carry extra things. Biometrics can be divided into two types: physiological characteristics and behavioral characteristics. This study belongs to behavioral characteristics and adopts dynamic keystroke behavior to verify the identity. Many dynamic keystroke authentication methods have been proposed, but most of them are only suitable for English. Only very small numbers of keystroke authentication research are designed for other language (such as Chinese). This study focuses on how to use Chinese keystrokes for continuous authentication. Different persons have different vocabulary usages. The main influence comes from different exposure to different "word frequency" during the learning process. "Word frequency" is the frequency at which words appear in a person's life. Frequency varies due to the individual's life experience. Therefore, if the user frequently enters a word, the user will be more familiar with the input of the word, so the familiarity will be related to the past learning cognition. This study treats this familiarity as a cognitive factor, and explores the impact of cognitive factors on identity verification in Chinese language. This study compares the keystroke authentication with cognitive factors and the keystroke authentication without considering cognitive factors. It is found that the former is more accurate than the latter.
引用
收藏
页数:2
相关论文
共 50 条
[41]   User Authentication Using Keystroke Dynamics via Crowdsourcing [J].
Foresi, Andrew ;
Samavi, Reza .
2019 17TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2019, :336-338
[42]   Sensing Pressure for Authentication System Using Keystroke Dynamics [J].
Nonaka, Hidetoshi ;
Kurihara, Masahito .
PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 1, 2007, 1 :16-19
[43]   Fast Continuous User Authentication using Distance Metric Fusion of Free-text Keystroke Data [J].
Ayotte, Blaine ;
Huang, Jiaju ;
Banavar, Mahesh K. ;
Hou, Daqing ;
Schuckers, Stephanie .
2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW 2019), 2019, :2380-2388
[44]   Keystroke Dynamics Authentication Using Neural Network Approaches [J].
Shanmugapriya, Venkateswaran ;
Padmavathi, Ganapathi .
INFORMATION AND COMMUNICATION TECHNOLOGIES, 2010, 101 :686-+
[45]   A novel approach for user authentication using keystroke dynamics [J].
Shekhawat, Kirty ;
Bhatt, Devershi Pallavi .
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (07) :2015-2027
[46]   Biometric personal authentication using keystroke dynamics: A review [J].
Karnan, M. ;
Akila, M. ;
Krishnaraj, N. .
APPLIED SOFT COMPUTING, 2011, 11 (02) :1565-1573
[47]   Keystroke Dynamics based Authentication using Fuzzy Logic [J].
Yadav, Jatin ;
Pandey, Kavita ;
Gupta, Shashank ;
Sharma, Richa .
2017 TENTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2017, :313-318
[48]   CrossBehaAuth: Cross-Scenario Behavioral Biometrics Authentication Using Keystroke Dynamics [J].
Lin, Chenhao ;
He, Jingyi ;
Shen, Chao ;
Li, Qi ;
Wang, Qian .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (03) :2314-2327
[49]   User authentication by information source using fuzzy approach in biometric keystroke dynamics [J].
Hub, Miloslav .
PROCEEDINGS OF THE 11TH WSEAS INTERNATIONAL CONFERENCE ON SYSTEMS, VOL 2: SYSTEMS THEORY AND APPLICATIONS, 2007, :270-+
[50]   Keystroke Dynamics-Based Authentication System Using Empirical Thresholding Algorithm [J].
Priya, C., V ;
Viji, K. S. Angel .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2021, 15 (04) :98-117